Skip to main content

Shmoocon 2014

Shmoocon

Shmoocon 2014: Held in Washington D.C. from January 17-19, 2014, at the Washington Hilton. This collection contains all recorded main area talks at the event.

DIFFERENT - ShmooCon is an annual east coast hacker convention hell-bent on offering three days of an interesting atmosphere for demonstrating technology exploitation, inventive software and hardware solutions, and open discussions of critical infosec issues. The first day is a single track of speed talks called One Track Mind. The next two days bring three tracks: Build It, Belay It and Bring It On.

AFFORDABLE - ShmooCon is about high quality without the high price. Keep in mind that space is limited, and we've sold out quickly every year.

ACCESSIBLE - ShmooCon is held in Washington, DC at the Washington Hilton about four blocks from the DC Metro's Dupont Circle Station. Fly into DCA, IAD or BWI or take a train to Union Station, and you're just a short cab ride away from the con.

ENTERTAINING - Brain melting from all the cool tech you're learning? Be sure to check out the other events running during ShmooCon, including ShmooCon Labs, the Lockpick Village, Ghost in the Shellcode and more.

The Shmoo Group is a think-tank of like-minded individuals who share a passion for information security research and development. TSG members' expertise incorporates field-dressing a moose to extragalactic astrophysics to Python capabilities, cutting-edge wearable computing to encryption to sharp-shooting. The group mind adds a razor-sharp sense of sarcasm to a refusal to take anything about the Internet seriously, mixed liberally with tequila, community service, wireless networking and RFID hackery.

Schedule

Friday, January 17, 2014
Time One Track Mind
1230 Registration Opens
1430
Opening Remarks, Rumblings, and Rants

Bruce Potter

1530
Attacker Ghost Stories: Mostly Free Defenses That Give Attackers Nightmares

Mubix "Rob" Fuller

1600
The Evolution of Linux Kernel Module Signing

Rebecca ".bx" Shapiro

1630
How Hackers for Charity (Possibly) Saved Me a Lot of Money

Branden Miller and Emily Miller

1700
CCTV: Setup, Attack Vectors, and Laws

Joshua Schroeder and Spencer Brooks

1730
Security Analytics: Less Hype, More Data

Aaron Gee-Clough

1800
Dissipation of Hackers in the Enterprise

Weasel

1830

Keynote Address

Privacy Online: What Now?

Ian Goldberg

1945 Friday Fire Talks

Saturday, January 18, 2014
Time Build It! Belay It! Bring it On!
0930 Registration Opens
1000
Genuinely "Trusted Computing:" Free and Open Hardware Security Modules

Ryan Lackey


Introducing DARPA's Cyber Grand Challenge

Mike Walker


Technology Law Issues for Security Professionals

Shannon Brown

1100
Malicious Threats, Vulnerabilities, and Defenses in WhatsApp and Mobile Instant Messaging Platforms

Jaime Sanchez and Pablo San Emeterio


Unambiguous Encapsulation - Separating Data and Signaling

Dominic Spill and Michael Ossmann


I Found a Thing and You Can (Should) Too: ISP's Unauthenticated SOAP Service = Find (Almost) All The Things!

Nicholas Popovich

1200
SafeCurves: Choosing Safe Curves for Elliptic-Curve Cryptography

Daniel J. Bernstein and Tanja Lange


A Critical Review of Spatial Analysis

David Giametta and Andrew Potter


Arms Race: The Story of (In)-Secure Bootloaders

Lee Harrison and Kang Li

1300 Lunch Break
1400
Controlling USB Flash Drive Controllers: Expose of Hidden Features

Richard Harman


Data Whales and Troll Tears: Beat the Odds in InfoSec

Davi Ottenheimer and Allison Miller


Syncing Mentorship Between Winners And Beginners

Tarah Wheeler Van Vlack and Liz Dahlstrom

1500
0wn the Con

The Shmoo Group


Operationalizing Threat Information Sharing: Beyond Policies and Platitudes

Sean Barnum and Aharon Chernin


The NSA: Capabilities and Countermeasures

Bruce Schneier

1600
AV Evasion With the Veil Framework
Part 2)

Christopher Truncer, Will Schroeder, and Michael Wright


The "Science of Cyber" and the Next Generation of Security Tools

Paulo Shakarian


How to Train your Snapdragon: Exploring Power Frameworks on Android

Josh "m0nk" Thomas

1700
ADD -- Complicating Memory Forensics Through Memory Disarray

Jake Williams and Alissa Torres


Timing-Based Attestation: Sexy Defense, or the Sexiest?

Xeno Kovah, Corey Kallenberg, and John Butterworth


LTE vs. Darwin

Hendrik Schmidt and Brian Butterly

1815 Saturday Fire Talks
2015
Saturday Night Party @ The Hilton, International Center Ballroom

Paul and Storm

DJs: Keith Meyers, Zack Fasel, and Erin Jacobs


Sunday, January 19, 2014
Time Build It! Belay It! Bring it On!
0930 Registration Opens
1000
An Open and Affordable USB Man in the Middle Device

Dominic Spill


"How I Met Your Mother" or The Brief and Secret History of Bletchley Park and How They Invented Cryptography and the Computer Age

Benjamin Gatti


Malicious Online Activities Related to the 2012 U.S. General Election

Joshua Franklin, Robert Tarlecki, Matthew Jablonski, and Dr. Damon McCoy

1100
unROP: A Tool for In-Memory ROP Exploitation Detection and Traceback

Kang Li, Xiaoning Li, and Lee Harrison


Raising Costs for Your Attackers Instead of Your CFO

Aaron Beuhring and Kyle Salous


Vehicle Forensics - The Data Beyond the Dashboard

Courtney Lancaster

1200
Introducing idb - Simplified Blackbox iOS App Pentesting

Daniel A. Mayer


Practical Applications of Data Science in Detection

Mike Sconzo and Brian Wylie


You Don't Have the Evidence

Scott Moulton

1300 Room Split Break
1330

Closing Plenary

Large Scale Network and Application Scanning

Bruce Potter (moderator), Robert David Graham, Paul McMillan, Dan Tentler, and Alejandro Caceres

1430 Closing Remarks


42
RESULTS
rss


PART OF
Shmoocon
Hacker Conferences
Media Type
41
movies
1
texts
Year
42
2014
Topics & Subjects
1
completion tracker
1
cryptography
1
data
1
defenses
1
forensics
1
hackers
More right-solid
Collection
More right-solid
Creator
2
christopher truncer, will schroeder, and michael wright
2
various
1
aaron beuhring and kyle salous
1
aaron gee-clough
1
benjamin gatti
1
branden miller (f0zzie) and emily miller (ch1cken)
More right-solid
Language
1
Spanish
SHOW DETAILS
up-solid down-solid
eye
Title
Date Archived
Creator
Shmoocon 2014
movies
eye 9,903
favorite 2
comment 0
Controlling USB Flash Drive Controllers: Expose of Hidden Features Richard Harman With stories of "BadBIOS" infecting PCs simply by connecting a malicious USB flash drive to a PC, it's time we learned about flash drives and their controllers. Consumer USB flash drives are cheap, growing in capacity and shrinking in physical size. There are only around 15 prominent controller chip manufacturers whom you have never heard of, but OEM for all the popular and respected "name...
Shmoocon 2014
movies
eye 1,222
favorite 0
comment 0
An Open and Affordable USB Man in the Middle Device Dominic Spill With the introduction of FaceDancer, there has been a surge of interest in USB security. USBProxy is an open framework for the BeagleBone Black to make it simpler for anyone to monitor, inject or modify data carried over a USB connection. While the FaceDancer will allow devices to be written on a host system, we are able to go further and man-in-the-middle connections to existing devices as well. The BeagleBone Black also enables...
Shmoocon 2014
by Christopher Truncer, Will Schroeder, and Michael Wright
movies
eye 846
favorite 0
comment 0
AV Evasion With the Veil Framework Christopher Truncer, Will Schroeder, and Michael Wright As antivirus (finally) has started to slowly increase in effectiveness, more and more of the payloads used during penetration tests are being caught. While the industry as a whole has demonstrated its capabilities of bypassing AV solutions in nearly all situations, valuable assessment time is often lost. The Veil-Evasion Framework (Veil) was developed to solve this problem by offering a modular,...
Shmoocon 2014
by Daniel J. Bernstein and Tanja Lange
movies
eye 803
favorite 0
comment 0
SafeCurves: Choosing Safe Curves for Elliptic-Curve Cryptography Daniel J. Bernstein and Tanja Lange There are several different standards covering selection of curves for use in elliptic-curve cryptography (ECC). Each of these standards tries to ensure that the elliptic-curve discrete-logarithm problem (ECDLP) is difficult. ECDLP is the problem of finding an ECC user's secret key, given the user's public key. Unfortunately, there is a gap between ECDLP difficulty and ECC security. None of...
Shmoocon 2014
by Lee Harrison and Kang Li
movies
eye 759
favorite 0
comment 0
Arms Race: The Story of (In)-Secure Bootloaders Lee Harrison and Kang Li Secure boot is the process that ensures the critical parts of software (e.g. kernel) running on a device are authorized and have not been tampered with. Many wireless service providers prefer to have a locked down version of their smartphones that can only boot the official kernel, and do not allow loading customized systems developed by users. This results in an arms race between the smartphone vendors and the users that...
Shmoocon 2014
by Rob "Mubix" Fuller
movies
eye 699
favorite 0
comment 0
Attacker Ghost Stories: Mostly Free Defenses That Give Attackers Nightmares Rob "Mubix" Fuller This talk is about protections, mitigations, or detection mechanisms that I’ve seen across businesses big and small that were innovative and highly effective, yet free (or mostly free) and stopped me (as an attacker) dead in my tracks. We will be going over 11 (or a many as we can get to) methods, tactics, and software setups that will cut down intrusions significantly. Changes that you...
Shmoocon 2014
movies
eye 584
favorite 0
comment 0
Introducing idb - Simplified Blackbox iOS App Pentesting Daniel A. Mayer More than ever, mobile apps are used to manage and store sensitive data by both corporations and individuals. In this talk, we review common iOS mobile app flaws involving data storage, inter-process communication, network communications, and user input handling as seen in real-world applications. To assist the community in assessing security risks of mobile apps, we introduce a new tool called 'idb' and show how it can be...
Shmoocon 2014
by Benjamin Gatti
movies
eye 575
favorite 0
comment 0
"How I Met Your Mother" or The Brief and Secret History of Bletchley Park and How They Invented Cryptography and the Computer Age Benjamin Gatti In the darkest days of WWII, a small team assembled at Bletchley Park solved two problems and set a new course for computers and cryptography - fast computers, and secure communications can both be traced back to one of the ugliest estates in London suburbia, where Alan Turing, Max Newman, Tommy Flowers, and others hacked their way through...
I Found a Thing and You Can (Should) Too: ISP's Unauthenticated SOAP Service = Find (Almost) All The Things! Nicholas Popovich This presentation is meant to encourage individuals to put the applications and software that they may use on their own home or small business networks under the research microscope. This will be a discussion of a recent independent research project that eventually led to an information disclosure vulnerability by a major U.S. ISP. This is also an example of when a...
Shmoocon 2014
by Bruce Schneier
movies
eye 497
favorite 0
comment 0
The NSA: Capabilities and Countermeasures Bruce Schneier Edward Snowden has given us an unprecedented window into the NSA's surveillance activities. Drawing from both the Snowden documents and revelations from previous whistleblowers, I will describe the sorts of surveillance the NSA does and how it does it. The emphasis is on the technical capabilities of the NSA, not the politics of their actions. This includes how it conducts Internet surveillance on the backbone, but is primarily focused on...
Shmoocon 2014
movies
eye 478
favorite 0
comment 0
Vehicle Forensics - The Data Beyond the Dashboard Courtney Lancaster With vehicle technologies constantly evolving, it is important to understand the threat to the consumer that leaves personal data behind, as well as the benefit to the investigator and how accessible this data can be. Infotainment systems are being rolled out into almost every new vehicle that is manufactured today. The art of mastering the hard drive, as well as a multitude of other components, has already occurred. Now,...
Shmoocon 2014
movies
eye 404
favorite 0
comment 0
Malicious Threats, Vulnerabilities, and Defenses in WhatsApp and Mobile Instant Messaging Platforms Jaime Sanchez and Pablo San Emeterio Global surveillance emerged as a phenomenon since the late 1940s and Internet and mobile technology are being developed with such pace that it is impossible to guarantee electronic privacy and nobody should expect it. How strong are the actual Instant Messaging Platforms? Do they take care of our security and privacy? We'll look inside the security of several...
Shmoocon 2014
by Aaron Beuhring and Kyle Salous
movies
eye 374
favorite 0
comment 0
Raising Costs for Your Attackers Instead of Your CFO Aaron Beuhring and Kyle Salous Everyone knows that blacklisting is not effective and that whitelisting is a better solution, so why isn't anyone doing it? Organizations continue to spend money on the latest technologies in hopes that if they spend enough they will somehow become secure. Chances are that that these same organizations already own technology that can provide far more powerful defense than new blinking boxes but just haven't...
Shmoocon 2014
movies
eye 324
favorite 1
comment 0
Security Analytics: Less Hype, More Data Aaron Gee-Clough There has been a lot of talk in the industry recently about "analytics" and getting security data from non-security logs. The problem is, very few people are talking about which analysis techniques are actually useful. This talk will look at a few log types and talk through analytics techniques that can be applied to each. For each technique, I'll talk about what it assumes and how it succeeds or fails when using real-world...
Shmoocon 2014
movies
eye 312
favorite 0
comment 0
Introducing DARPA's Cyber Grand Challenge Mike Walker Could a purpose-built supercomputer play DEFCON capture the flag? Mike Walker joined DARPA as a Program Manager in January 2013. His research interests relate to machine reasoning about software in situ and the automation of application security lifecycles. Mr. Walker has extensive industry experience. Prior to joining DARPA he worked as a security software developer, enterprise security architect, and research lab leader.
Shmoocon 2014
by Jake Williams and Alissa Torres
movies
eye 312
favorite 0
comment 0
ADD -- Complicating Memory Forensics Through Memory Disarray Jake Williams and Alissa Torres In this presentation, we'll present ADD (attention deficit disorder), a tool that litters Windows physical memory with (configurable amounts and types of) garbage to disrupt memory forensics. Memory forensics has become so mainstream that it's catching too many malware authors during routine investigations (making Jake a sad panda). If memory forensics were much harder to perform, then attackers would...
Shmoocon 2014
movies
eye 296
favorite 0
comment 0
Keynote Address: Privacy Online: What Now? Ian Goldberg Recent revelations about data and metadata collection of Internet users' communications have been extremely worrying. Not only are governments collecting this information, but online service providers, including cloud providers, are part of the picture as well. What can we, as individuals, do to limit the collection of our online messages, friends lists, and usage patterns? In this talk, we will look at existing and upcoming privacy...
Shmoocon 2014
by Scott Moulton
movies
eye 289
favorite 0
comment 0
You Don't Have the Evidence Scott Moulton Forensic imaging tools have one purpose, to soundly copy every sector on a device to a destination device and report success or failure without changing data. In the last 20 years most forensic imaging tools have not progress and continue to use the same basic code for imaging a drive. When encountering damage many of the tools have no ability to deal with the damage and quit, crash, or worse; do more damage to the drive they are trying to recover from....
Shmoocon 2014
movies
eye 287
favorite 0
comment 0
The "Science of Cyber" and the Next Generation of Security Tools Paulo Shakarian Governments around the world are investing heavily in the so called "science of cyber" in order to create a rigorous scientific base for the next generation of security tools. But what's going on in the walled-off world of academia? Will this new science eventually lead to more improved security in cyber space? In this talk, I will describe three ongoing projects at West Point in collaboration...
Shmoocon 2014
by Xeno Kovah, Corey Kallenberg, and John Butterworth
movies
eye 281
favorite 0
comment 0
Timing-Based Attestation: Sexy Defense, or the Sexiest? Xeno Kovah, Corey Kallenberg, and John Butterworth What if I told you it's possible to ask a drunk person if he's drunk - and get an accurate answer, by measuring the reaction time? What if I told you it's possible to design security software under the assumption that the attacker has the same privileges as the defender, and the attacker can scribble over and modify the defender's code as much as he wants, but he'll still get caught? This...
Shmoocon 2014
by Joshua Schroeder and Spencer Brooks
movies
eye 276
favorite 0
comment 0
CCTV: Setup, Attack Vectors, and Laws Joshua Schroeder and Spencer Brooks Ever wonder how to setup a CCTV Digital Video Recording security system? This talk will show how to do that, as well as key factors like attack vectors and recording laws. First, we will go over basic setup on how we planned out this project and current price points for entry. This will include things to be mindful of such as camera quality, disk space and other features. In the second part, we will cover attack vectors...
Shmoocon 2014
by Dominic Spill and Michael Ossmann
movies
eye 270
favorite 0
comment 0
Unambiguous Encapsulation - Separating Data and Signaling Dominic Spill and Michael Ossmann Attacks against in band signaling systems have been demonstrated against Zigbee and Ethernet in the past few years. In many ways these are similar to memory corruption attacks as both rely on data being interpreted as meta-data by the target system. We have built tools to generate sets of error correcting codes that can be used to prevent untrusted user supplied data from being interpreted as meta-data...
Shmoocon 2014
by Mike Sconzo and Brian Wylie
movies
eye 266
favorite 1
comment 0
Practical Applications of Data Science in Detection Mike Sconzo and Brian Wylie It seems recently offensive tactics, exploits and vulnerabilities are getting all the Info Sec sexy-points. We're going to try and swing this back towards detection as we apply some new-fangled math and techniques to solve some existing problems and tackling new ones. We'll take Data Science off its pedestal and show how, with problem and data understanding you can apply different techniques to make analysis more...
Shmoocon 2014
movies
eye 247
favorite 0
comment 0
Genuinely "Trusted Computing:" Free and Open Hardware Security Modules Ryan Lackey "Trusted Computing" unfortunately often means trusting a black box provided by a third party who may not be particularly trustworthy. We present an alternative -- a user assembled hardware security module, based on a published design, using simple components which can be fully inspected by the user prior to assembly and commissioning. Ryan Lackey has 20 years of experience computer security,...
Shmoocon 2014
by Bruce and Heidi Potter
movies
eye 242
favorite 0
comment 0
ShmooCon 2014 - Opening Remarks Rumblings and Rants
Shmoocon 2014
movies
eye 236
favorite 0
comment 0
How to Train your Snapdragon: Exploring Power Frameworks on Android Josh "m0nk" Thomas Have you ever wondered how power is routed around your phone, how it is stored and if it could be made dangerous? I have, and I somehow talked the DARPA Cyber Fast Track group into funding my research into the subject and allowing me to name it: "Project Burner: El Telefono Inteligente de Fuego." The overall goal of the project was: "Can I catch a phone on fire using nothing but the...
Shmoocon 2014
by Bruce Potter (moderator), Robert David Graham, Paul McMillan, Dan Tentler, and Alejandro Caceres
movies
eye 229
favorite 0
comment 0
Closing Plenary: Large Scale Network and Application Scanning Bruce Potter (moderator), Robert David Graham, Paul McMillan, Dan Tentler, and Alejandro Caceres From proff's strobe to modern day distributed network scanners, probing remote systems and applications to assess a system's security posture is a core part of our offensive and defensive tool kits. This panel discussion will examine the state of the art of network and application scanning. During the session, the entire Internet will be...
Shmoocon 2014
by Hendrik Schmidt and Brian Butterly
movies
eye 227
favorite 0
comment 0
LTE vs. Darwin Hendrik Schmidt and Brian Butterly Whether believing in Darwin or not, the Darwin-Award states an important fact of mankind, technology and probably everything that exists: You only make certain mistakes once. For mankind this usually implies taking oneself out of the gene pool, for companies it can mean to vanish of the market and for technology, well, early death. So when looking at "Long Term Evolution," providers need to implement proposed features properly and work...
Shmoocon 2014
movies
eye 202
favorite 0
comment 0
Operationalizing Threat Information Sharing: Beyond Policies and Platitudes Sean Barnum and Aharon Chernin Threat intelligence sharing is a hot topic of conversation today that already affects or soon will affect most of us in the infosec community. Like most hot topics this tends to generate a lot of cliched buzzworditis and well-meant but unrealistic policy. Cue the shmooballs! But what does it take to move beyond just talking about cyber threat intelligence sharing and making it an...
Shmoocon 2014
movies
eye 189
favorite 0
comment 0
Dissipation of Hackers in the Enterprise Weasel From the early days of the InfoSec industry to today there has been a constant seeping of deep-knowledge technologists into a slew of disciplines that are not primarily focused on the protection of enterprise assets. This dialog will explore and question the contributors to the diminishing attractiveness of the enterprise as a logical career path for hackers. We will go over data that shows that shift from enterprises being a primary employer for...
Shmoocon 2014
by Branden Miller (f0zzie) and Emily Miller (ch1cken)
movies
eye 188
favorite 0
comment 0
How Hackers for Charity (Possibly) Saved Me a Lot of Money Branden Miller (f0zzie) and Emily Miller (ch1cken) What do you do when your oldest child tells you she wants to be an artist? If you are me you panic under the weight of the idea that you will be supporting your kid for life! Then you use her determination to help others as a motivator and gently (re)focus her onto technology. After 20 years in the Navy, f0zzie became a Senior Security Analyst in the Healthcare industry. He is a family...
Shmoocon 2014
by David Giametta and Andrew Potter
movies
eye 185
favorite 0
comment 0
A Critical Review of Spatial Analysis David Giametta and Andrew Potter Spatial Analysis is a recently proposed idea of using static analysis based byte sequences characterized by statistical features fused and graphed into 2-D grids where new exploitable information is obtained. The new information is the spatial structure similarity of byte sequences located with files believed to be similar and related. The structure is generated using simple fixed size sliding windows moving along the byte...
Shmoocon 2014
by The Shmoo Group
movies
eye 177
favorite 0
comment 0
0wn the Con The Shmoo Group For ten years we've chosen to stand up and share all the ins and outs and inner workings of the con. Why stop now? Join us to get the break down of budget, an insight to the CFP process, a breakdown of the hours it takes to put on a con like ShmooCon and anything thing else you might want to talk about. This is an informative, fast paced and generally fun session as Bruce dances on stage, and Heidi tries to hide from the mic. Seriously though--if you ever wanted to...
Shmoocon 2014
by Christopher Truncer, Will Schroeder, and Michael Wright
movies
eye 169
favorite 0
comment 0
AV Evasion With the Veil Framework Christopher Truncer, Will Schroeder, and Michael Wright As antivirus (finally) has started to slowly increase in effectiveness, more and more of the payloads used during penetration tests are being caught. While the industry as a whole has demonstrated its capabilities of bypassing AV solutions in nearly all situations, valuable assessment time is often lost. The Veil-Evasion Framework (Veil) was developed to solve this problem by offering a modular,...
Shmoocon 2014
movies
eye 155
favorite 0
comment 0
Technology Law Issues for Security Professionals Shannon Brown An emerging gap exists between the demands of today's technology systems, the necessity for computer security research, and the reality of the law. The potential tension between these elements poses a challenge especially for computer security researchers--some who might be misunderstood or who may unintentionally run afoul a myriad of complex laws with potentially breathtaking penalties. In plain language, this presentation raises...
Shmoocon 2014
by Joshua Franklin, Robert Tarlecki, Matthew Jablonski, and Dr. Damon McCoy
movies
eye 143
favorite 0
comment 0
Malicious Online Activities Related to the 2012 U.S. General Election Joshua Franklin, Robert Tarlecki, Matthew Jablonski, and Dr. Damon McCoy This presentation looks back at the number of ways that the 2012 Presidential election was bought, sold, and manipulated through malicious online activities. We identify activities that could be classified as manipulative, mischievous, or downright illegal, such as fake campaign donation sites, political spam, attempts to sell ballots, privacy...
Shmoocon 2014
by Various
movies
eye 141
favorite 0
comment 0
ShmooCon FireTalks are 15 minute presentations meant to be an alternative to the traditional 30 to 90 minute conference format. Similar to 5 minute Lightning Talks, the purpose is to challenge speakers to skip the BS and instead dive right into the core of their content in a more relaxed alternative environment. Unlike Lightning Talks, which are usually performed in rapid succession, the additional time allows the speaker to follow a more traditional introduction, body, and conclusion format....
Shmoocon 2014
by Davi Ottenheimer and Allison Miller
movies
eye 137
favorite 0
comment 0
Data Whales and Troll Tears: Beat the Odds in InfoSec Davi Ottenheimer and Allison Miller The rising scale and complexity of IT is creating ever more opportunities for abuse and attack. Many for years have warned we face a losing race if we rely on patch and mend. Others for years have advocated using a threat-based priority system. Is there room to consider a middle path or can we prove with science the existence of a third wave? This data-intensive presentation highlights real-world examples...
Shmoocon 2014
texts
eye 130
favorite 0
comment 0
Shmoo 2014 Vids List.
Topics: tracker, video, data, hackers, cryptography, forensics, defenses, usb, kang, miller, video...
Shmoocon 2014
by Various
movies
eye 121
favorite 0
comment 0
ShmooCon FireTalks are 15 minute presentations meant to be an alternative to the traditional 30 to 90 minute conference format. Similar to 5 minute Lightning Talks, the purpose is to challenge speakers to skip the BS and instead dive right into the core of their content in a more relaxed alternative environment. Unlike Lightning Talks, which are usually performed in rapid succession, the additional time allows the speaker to follow a more traditional introduction, body, and conclusion format....
Shmoocon 2014
by Tarah Wheeler Van Vlack and Liz Dahlstrom
movies
eye 116
favorite 0
comment 0
Syncing Mentorship Between Winners And Beginners Tarah Wheeler Van Vlack and Liz Dahlstrom Mentorship in technology is broken. Many minorities feel unwelcome in tech. The number of women in technology is actually decreasing. The only solution which is proven to increase positive outcomes is mentorship. Unfortunately, winners in tech either don't realize their help is needed or don't know how to get started. Beginners are often afraid to ask for help or don't know where to find it. We at Hack...
Shmoocon 2014
by Shmoocon Organizers and Friends
movies
eye 111
favorite 0
comment 0
Closing ceremonies for ShmooCon 2014, including organizer statements, contest results, calls for volunteers and assistance, overview of the con's performance, and highlights from the events of the weekend.